ABSTRACT

Research and Development Exchange Proceedings: Research and Development Issues to Ensure Trustworthiness in Telecommunications and Information Sharing Systems that Directly or Indirectly Impact National Security and Emergency Preparedness   [open pdf - 970KB]

"From March 13 to 14, 2003, the President's National Security Telecommunications Advisory Committee conducted its fifth Research and Development (R&D) Exchange entitled, Research and Development Issues to Ensure Trustworthiness in Telecommunications and Information Systems that Directly or Indirectly Impact National Security and Emergency Preparedness (NS/EP). The event was co-sponsored by the White House Office of Science and Technology Policy and the Georgia Tech Information Security Center at the Georgia Institute of Technology. Its purpose was to stimulate an exchange of ideas among researchers and practitioners from the telecommunications industry, Government, and academia on issues regarding the trustworthiness of NS/EP telecommunications systems. Increasing reliance on the public switched network, the Internet, and computer applications to support national, homeland, and economic security, emergency preparedness, and public safety places a premium on 'trusted' systems and networks. The September 11, 2001, terrorist attacks demonstrated the critical importance of networked information systems in supporting national crisis management and response. Ensuring that national leaders, first responders, infrastructure owners and operators, and the general public receive timely, accurate, and complete information through trustworthy NS/EP telecommunications-and the underlying networked information systems-is crucial to meeting national security and homeland security objectives. To date, a majority of the research studies and activities on the trustworthiness of network information systems have focused on vulnerabilities in cyberspace (e.g., the National Research Council's seminal report Trust in Cyberspace). However, achieving and sustaining trustworthiness in those systems is jeopardized by a host of threats (e.g., exploitation by insiders, physical destruction) that extend beyond cyberspace."

Publisher:
Date:
2003-03
Copyright:
Public Domain
Retrieved From:
National Security Telecommunications Advisory Committee (NSTAC): http://www.ncs.gov/nstac/
Format:
pdf
Media Type:
application/pdf
Source:
Research and Development Exchange Proceedings, Georgia Institute of Technology, Atlanta, Georgia, March 13-14, 2003
URL:
Help with citations